Hay
Date
April 22, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   19.813735] ==================================================================
[   19.813854] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.813950] Read of size 1 at addr fff00000c4284273 by task kunit_try_catch/223
[   19.814002] 
[   19.814059] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.814149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.814180] Hardware name: linux,dummy-virt (DT)
[   19.814213] Call trace:
[   19.814246]  show_stack+0x20/0x38 (C)
[   19.814303]  dump_stack_lvl+0x8c/0xd0
[   19.814354]  print_report+0x118/0x608
[   19.814397]  kasan_report+0xdc/0x128
[   19.814439]  __asan_report_load1_noabort+0x20/0x30
[   19.814489]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.814564]  mempool_kmalloc_oob_right+0xc4/0x120
[   19.814620]  kunit_try_run_case+0x170/0x3f0
[   19.814672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.814724]  kthread+0x328/0x630
[   19.814772]  ret_from_fork+0x10/0x20
[   19.814821] 
[   19.814841] Allocated by task 223:
[   19.814872]  kasan_save_stack+0x3c/0x68
[   19.814915]  kasan_save_track+0x20/0x40
[   19.814952]  kasan_save_alloc_info+0x40/0x58
[   19.814989]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.815030]  remove_element+0x130/0x1f8
[   19.815069]  mempool_alloc_preallocated+0x58/0xc0
[   19.815110]  mempool_oob_right_helper+0x98/0x2f0
[   19.815152]  mempool_kmalloc_oob_right+0xc4/0x120
[   19.815191]  kunit_try_run_case+0x170/0x3f0
[   19.815230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.815274]  kthread+0x328/0x630
[   19.815371]  ret_from_fork+0x10/0x20
[   19.815441] 
[   19.815506] The buggy address belongs to the object at fff00000c4284200
[   19.815506]  which belongs to the cache kmalloc-128 of size 128
[   19.815645] The buggy address is located 0 bytes to the right of
[   19.815645]  allocated 115-byte region [fff00000c4284200, fff00000c4284273)
[   19.815730] 
[   19.815756] The buggy address belongs to the physical page:
[   19.815791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104284
[   19.815849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.815902] page_type: f5(slab)
[   19.815945] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.815994] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.816035] page dumped because: kasan: bad access detected
[   19.816065] 
[   19.816082] Memory state around the buggy address:
[   19.816118]  fff00000c4284100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.816162]  fff00000c4284180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.816206] >fff00000c4284200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.816246]                                                              ^
[   19.816287]  fff00000c4284280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.816331]  fff00000c4284300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.816370] ==================================================================
[   19.857368] ==================================================================
[   19.857567] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.858009] Read of size 1 at addr fff00000c62a42bb by task kunit_try_catch/227
[   19.858140] 
[   19.858840] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.859553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.859911] Hardware name: linux,dummy-virt (DT)
[   19.860047] Call trace:
[   19.860205]  show_stack+0x20/0x38 (C)
[   19.860363]  dump_stack_lvl+0x8c/0xd0
[   19.860604]  print_report+0x118/0x608
[   19.860710]  kasan_report+0xdc/0x128
[   19.860810]  __asan_report_load1_noabort+0x20/0x30
[   19.861068]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.861834]  mempool_slab_oob_right+0xc0/0x118
[   19.862542]  kunit_try_run_case+0x170/0x3f0
[   19.863047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.863352]  kthread+0x328/0x630
[   19.863441]  ret_from_fork+0x10/0x20
[   19.863548] 
[   19.863589] Allocated by task 227:
[   19.864366]  kasan_save_stack+0x3c/0x68
[   19.864685]  kasan_save_track+0x20/0x40
[   19.864905]  kasan_save_alloc_info+0x40/0x58
[   19.865041]  __kasan_mempool_unpoison_object+0xbc/0x180
[   19.865142]  remove_element+0x16c/0x1f8
[   19.865228]  mempool_alloc_preallocated+0x58/0xc0
[   19.865314]  mempool_oob_right_helper+0x98/0x2f0
[   19.865399]  mempool_slab_oob_right+0xc0/0x118
[   19.865499]  kunit_try_run_case+0x170/0x3f0
[   19.866737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.867090]  kthread+0x328/0x630
[   19.867221]  ret_from_fork+0x10/0x20
[   19.867492] 
[   19.867690] The buggy address belongs to the object at fff00000c62a4240
[   19.867690]  which belongs to the cache test_cache of size 123
[   19.868094] The buggy address is located 0 bytes to the right of
[   19.868094]  allocated 123-byte region [fff00000c62a4240, fff00000c62a42bb)
[   19.868256] 
[   19.868306] The buggy address belongs to the physical page:
[   19.868375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062a4
[   19.868487] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.868943] page_type: f5(slab)
[   19.869192] raw: 0bfffe0000000000 fff00000c405d640 dead000000000122 0000000000000000
[   19.869432] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   19.869569] page dumped because: kasan: bad access detected
[   19.869904] 
[   19.869969] Memory state around the buggy address:
[   19.870172]  fff00000c62a4180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.870466]  fff00000c62a4200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   19.870730] >fff00000c62a4280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   19.870826]                                         ^
[   19.870915]  fff00000c62a4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.871521]  fff00000c62a4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.871727] ==================================================================
[   19.828755] ==================================================================
[   19.828910] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.829114] Read of size 1 at addr fff00000c6bb6001 by task kunit_try_catch/225
[   19.829276] 
[   19.829370] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   19.829670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.829744] Hardware name: linux,dummy-virt (DT)
[   19.830028] Call trace:
[   19.830396]  show_stack+0x20/0x38 (C)
[   19.830565]  dump_stack_lvl+0x8c/0xd0
[   19.830661]  print_report+0x118/0x608
[   19.830970]  kasan_report+0xdc/0x128
[   19.831250]  __asan_report_load1_noabort+0x20/0x30
[   19.831365]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.831496]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   19.831670]  kunit_try_run_case+0x170/0x3f0
[   19.831823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.831963]  kthread+0x328/0x630
[   19.832081]  ret_from_fork+0x10/0x20
[   19.832223] 
[   19.832294] The buggy address belongs to the physical page:
[   19.832399] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106bb4
[   19.832567] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.832665] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.832848] page_type: f8(unknown)
[   19.833037] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.833137] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.833542] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.833706] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.833827] head: 0bfffe0000000002 ffffc1ffc31aed01 00000000ffffffff 00000000ffffffff
[   19.833944] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.834040] page dumped because: kasan: bad access detected
[   19.834111] 
[   19.834150] Memory state around the buggy address:
[   19.834235]  fff00000c6bb5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.834358]  fff00000c6bb5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.834556] >fff00000c6bb6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.834807]                    ^
[   19.834907]  fff00000c6bb6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.835075]  fff00000c6bb6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.835164] ==================================================================

[   20.280217] ==================================================================
[   20.280968] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   20.281391] Read of size 1 at addr ffff8881029812bb by task kunit_try_catch/245
[   20.281851] 
[   20.283166] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   20.283455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.283482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.283549] Call Trace:
[   20.283578]  <TASK>
[   20.283622]  dump_stack_lvl+0x73/0xb0
[   20.283682]  print_report+0xd1/0x650
[   20.283734]  ? __virt_addr_valid+0x1db/0x2d0
[   20.283784]  ? mempool_oob_right_helper+0x318/0x380
[   20.283833]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.283881]  ? mempool_oob_right_helper+0x318/0x380
[   20.283932]  kasan_report+0x141/0x180
[   20.283979]  ? mempool_oob_right_helper+0x318/0x380
[   20.284044]  __asan_report_load1_noabort+0x18/0x20
[   20.284089]  mempool_oob_right_helper+0x318/0x380
[   20.284142]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   20.284200]  ? finish_task_switch.isra.0+0x153/0x700
[   20.284259]  mempool_slab_oob_right+0xed/0x140
[   20.284302]  ? __pfx_mempool_slab_oob_right+0x10/0x10
[   20.284344]  ? dequeue_task_fair+0x166/0x4e0
[   20.284400]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   20.284446]  ? __pfx_mempool_free_slab+0x10/0x10
[   20.284507]  ? __pfx_read_tsc+0x10/0x10
[   20.284556]  ? ktime_get_ts64+0x86/0x230
[   20.284609]  kunit_try_run_case+0x1a5/0x480
[   20.284666]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.284787]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.284933]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.285106]  ? __kthread_parkme+0x82/0x180
[   20.285202]  ? preempt_count_sub+0x50/0x80
[   20.285245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.285280]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.285313]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.285345]  kthread+0x337/0x6f0
[   20.285375]  ? trace_preempt_on+0x20/0xc0
[   20.285436]  ? __pfx_kthread+0x10/0x10
[   20.285531]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.285568]  ? calculate_sigpending+0x7b/0xa0
[   20.285609]  ? __pfx_kthread+0x10/0x10
[   20.285642]  ret_from_fork+0x41/0x80
[   20.285674]  ? __pfx_kthread+0x10/0x10
[   20.285704]  ret_from_fork_asm+0x1a/0x30
[   20.285748]  </TASK>
[   20.285763] 
[   20.304755] Allocated by task 245:
[   20.305550]  kasan_save_stack+0x45/0x70
[   20.305883]  kasan_save_track+0x18/0x40
[   20.306114]  kasan_save_alloc_info+0x3b/0x50
[   20.306357]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   20.307335]  remove_element+0x11e/0x190
[   20.308093]  mempool_alloc_preallocated+0x4d/0x90
[   20.308360]  mempool_oob_right_helper+0x8a/0x380
[   20.308638]  mempool_slab_oob_right+0xed/0x140
[   20.308881]  kunit_try_run_case+0x1a5/0x480
[   20.309116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.309394]  kthread+0x337/0x6f0
[   20.310144]  ret_from_fork+0x41/0x80
[   20.311023]  ret_from_fork_asm+0x1a/0x30
[   20.311418] 
[   20.311999] The buggy address belongs to the object at ffff888102981240
[   20.311999]  which belongs to the cache test_cache of size 123
[   20.312590] The buggy address is located 0 bytes to the right of
[   20.312590]  allocated 123-byte region [ffff888102981240, ffff8881029812bb)
[   20.313813] 
[   20.313953] The buggy address belongs to the physical page:
[   20.314216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102981
[   20.315869] flags: 0x200000000000000(node=0|zone=2)
[   20.316467] page_type: f5(slab)
[   20.317021] raw: 0200000000000000 ffff888101ad4dc0 dead000000000122 0000000000000000
[   20.317398] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   20.317900] page dumped because: kasan: bad access detected
[   20.318176] 
[   20.318299] Memory state around the buggy address:
[   20.319442]  ffff888102981180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.319960]  ffff888102981200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   20.320460] >ffff888102981280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   20.320965]                                         ^
[   20.321358]  ffff888102981300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.322798]  ffff888102981380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.323328] ==================================================================
[   20.173398] ==================================================================
[   20.174381] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   20.175009] Read of size 1 at addr ffff888103c6a173 by task kunit_try_catch/241
[   20.176649] 
[   20.176938] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   20.177070] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.177108] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.177171] Call Trace:
[   20.177212]  <TASK>
[   20.177275]  dump_stack_lvl+0x73/0xb0
[   20.177342]  print_report+0xd1/0x650
[   20.177387]  ? __virt_addr_valid+0x1db/0x2d0
[   20.177465]  ? mempool_oob_right_helper+0x318/0x380
[   20.177557]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.177654]  ? mempool_oob_right_helper+0x318/0x380
[   20.177737]  kasan_report+0x141/0x180
[   20.177812]  ? mempool_oob_right_helper+0x318/0x380
[   20.177908]  __asan_report_load1_noabort+0x18/0x20
[   20.177985]  mempool_oob_right_helper+0x318/0x380
[   20.178069]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   20.178148]  ? dequeue_entities+0xa24/0x1790
[   20.178234]  ? finish_task_switch.isra.0+0x153/0x700
[   20.178326]  mempool_kmalloc_oob_right+0xf2/0x150
[   20.178393]  ? __pfx_mempool_kmalloc_oob_right+0x10/0x10
[   20.178444]  ? dequeue_task_fair+0x166/0x4e0
[   20.178557]  ? __pfx_mempool_kmalloc+0x10/0x10
[   20.178622]  ? __pfx_mempool_kfree+0x10/0x10
[   20.178656]  ? __pfx_read_tsc+0x10/0x10
[   20.178687]  ? ktime_get_ts64+0x86/0x230
[   20.178724]  kunit_try_run_case+0x1a5/0x480
[   20.178762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.178792]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.178828]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.178861]  ? __kthread_parkme+0x82/0x180
[   20.178893]  ? preempt_count_sub+0x50/0x80
[   20.178926]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.178960]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.178993]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.179024]  kthread+0x337/0x6f0
[   20.179055]  ? trace_preempt_on+0x20/0xc0
[   20.179090]  ? __pfx_kthread+0x10/0x10
[   20.179122]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.179153]  ? calculate_sigpending+0x7b/0xa0
[   20.179183]  ? __pfx_kthread+0x10/0x10
[   20.179215]  ret_from_fork+0x41/0x80
[   20.179244]  ? __pfx_kthread+0x10/0x10
[   20.179276]  ret_from_fork_asm+0x1a/0x30
[   20.179320]  </TASK>
[   20.179334] 
[   20.203258] Allocated by task 241:
[   20.204057]  kasan_save_stack+0x45/0x70
[   20.205146]  kasan_save_track+0x18/0x40
[   20.206114]  kasan_save_alloc_info+0x3b/0x50
[   20.207182]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   20.208262]  remove_element+0x11e/0x190
[   20.209142]  mempool_alloc_preallocated+0x4d/0x90
[   20.209641]  mempool_oob_right_helper+0x8a/0x380
[   20.209973]  mempool_kmalloc_oob_right+0xf2/0x150
[   20.210442]  kunit_try_run_case+0x1a5/0x480
[   20.211583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.212464]  kthread+0x337/0x6f0
[   20.213192]  ret_from_fork+0x41/0x80
[   20.213889]  ret_from_fork_asm+0x1a/0x30
[   20.214539] 
[   20.214976] The buggy address belongs to the object at ffff888103c6a100
[   20.214976]  which belongs to the cache kmalloc-128 of size 128
[   20.216155] The buggy address is located 0 bytes to the right of
[   20.216155]  allocated 115-byte region [ffff888103c6a100, ffff888103c6a173)
[   20.217696] 
[   20.218163] The buggy address belongs to the physical page:
[   20.218740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c6a
[   20.219796] flags: 0x200000000000000(node=0|zone=2)
[   20.220388] page_type: f5(slab)
[   20.220756] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   20.221415] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.222068] page dumped because: kasan: bad access detected
[   20.222348] 
[   20.222990] Memory state around the buggy address:
[   20.223258]  ffff888103c6a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.223648]  ffff888103c6a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.224015] >ffff888103c6a100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.224486]                                                              ^
[   20.226216]  ffff888103c6a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.226590]  ffff888103c6a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.227655] ==================================================================
[   20.235389] ==================================================================
[   20.236256] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380
[   20.236844] Read of size 1 at addr ffff888103cb6001 by task kunit_try_catch/243
[   20.237202] 
[   20.237361] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   20.237456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.237482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.238000] Call Trace:
[   20.238029]  <TASK>
[   20.238064]  dump_stack_lvl+0x73/0xb0
[   20.238120]  print_report+0xd1/0x650
[   20.238170]  ? __virt_addr_valid+0x1db/0x2d0
[   20.238215]  ? mempool_oob_right_helper+0x318/0x380
[   20.238270]  ? kasan_addr_to_slab+0x11/0xa0
[   20.238316]  ? mempool_oob_right_helper+0x318/0x380
[   20.238367]  kasan_report+0x141/0x180
[   20.238453]  ? mempool_oob_right_helper+0x318/0x380
[   20.238561]  __asan_report_load1_noabort+0x18/0x20
[   20.238633]  mempool_oob_right_helper+0x318/0x380
[   20.239110]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   20.239216]  ? dequeue_entities+0xa24/0x1790
[   20.239304]  ? finish_task_switch.isra.0+0x153/0x700
[   20.239393]  mempool_kmalloc_large_oob_right+0xf2/0x150
[   20.239580]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   20.240072]  ? dequeue_task_fair+0x166/0x4e0
[   20.240134]  ? __pfx_mempool_kmalloc+0x10/0x10
[   20.240179]  ? __pfx_mempool_kfree+0x10/0x10
[   20.240225]  ? __pfx_read_tsc+0x10/0x10
[   20.240273]  ? ktime_get_ts64+0x86/0x230
[   20.240327]  kunit_try_run_case+0x1a5/0x480
[   20.240379]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.240462]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.240538]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.240590]  ? __kthread_parkme+0x82/0x180
[   20.240634]  ? preempt_count_sub+0x50/0x80
[   20.240686]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.240737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.240788]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.240837]  kthread+0x337/0x6f0
[   20.240882]  ? trace_preempt_on+0x20/0xc0
[   20.240931]  ? __pfx_kthread+0x10/0x10
[   20.240978]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.241024]  ? calculate_sigpending+0x7b/0xa0
[   20.241068]  ? __pfx_kthread+0x10/0x10
[   20.241115]  ret_from_fork+0x41/0x80
[   20.241158]  ? __pfx_kthread+0x10/0x10
[   20.241223]  ret_from_fork_asm+0x1a/0x30
[   20.241298]  </TASK>
[   20.241315] 
[   20.255106] The buggy address belongs to the physical page:
[   20.255751] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103cb4
[   20.256513] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.257060] flags: 0x200000000000040(head|node=0|zone=2)
[   20.257519] page_type: f8(unknown)
[   20.257929] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.258688] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.259410] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.260195] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.260834] head: 0200000000000002 ffffea00040f2d01 00000000ffffffff 00000000ffffffff
[   20.261667] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.262281] page dumped because: kasan: bad access detected
[   20.262802] 
[   20.263082] Memory state around the buggy address:
[   20.263620]  ffff888103cb5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.264215]  ffff888103cb5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.264805] >ffff888103cb6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.265303]                    ^
[   20.265586]  ffff888103cb6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.265929]  ffff888103cb6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.266261] ==================================================================

[   21.366781] ==================================================================
[   21.367945] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.368668] Read of size 1 at addr ffff000010b842bb by task kunit_try_catch/283
[   21.369347] 
[   21.369513] CPU: 3 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.369565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.369579] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.369597] Call trace:
[   21.369609]  show_stack+0x20/0x38 (C)
[   21.369643]  dump_stack_lvl+0x8c/0xd0
[   21.369675]  print_report+0x118/0x608
[   21.369705]  kasan_report+0xdc/0x128
[   21.369734]  __asan_report_load1_noabort+0x20/0x30
[   21.369768]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.369805]  mempool_slab_oob_right+0xc0/0x118
[   21.369834]  kunit_try_run_case+0x170/0x3f0
[   21.369872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.369911]  kthread+0x328/0x630
[   21.369945]  ret_from_fork+0x10/0x20
[   21.369978] 
[   21.375998] Allocated by task 283:
[   21.376324]  kasan_save_stack+0x3c/0x68
[   21.376698]  kasan_save_track+0x20/0x40
[   21.377069]  kasan_save_alloc_info+0x40/0x58
[   21.377481]  __kasan_mempool_unpoison_object+0xbc/0x180
[   21.377977]  remove_element+0x16c/0x1f8
[   21.378357]  mempool_alloc_preallocated+0x58/0xc0
[   21.378811]  mempool_oob_right_helper+0x98/0x2f0
[   21.379259]  mempool_slab_oob_right+0xc0/0x118
[   21.379684]  kunit_try_run_case+0x170/0x3f0
[   21.380091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.380615]  kthread+0x328/0x630
[   21.380938]  ret_from_fork+0x10/0x20
[   21.381288] 
[   21.381441] The buggy address belongs to the object at ffff000010b84240
[   21.381441]  which belongs to the cache test_cache of size 123
[   21.382568] The buggy address is located 0 bytes to the right of
[   21.382568]  allocated 123-byte region [ffff000010b84240, ffff000010b842bb)
[   21.383745] 
[   21.383900] The buggy address belongs to the physical page:
[   21.384417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10b84
[   21.385151] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.385765] page_type: f5(slab)
[   21.386080] raw: 03fffe0000000000 ffff00000ca9e500 dead000000000122 0000000000000000
[   21.386797] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   21.387505] page dumped because: kasan: bad access detected
[   21.388020] 
[   21.388173] Memory state around the buggy address:
[   21.388621]  ffff000010b84180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.389288]  ffff000010b84200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   21.389954] >ffff000010b84280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   21.390617]                                         ^
[   21.391089]  ffff000010b84300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.391755]  ffff000010b84380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.392417] ==================================================================
[   21.341424] ==================================================================
[   21.342519] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.343229] Read of size 1 at addr ffff0000103b2001 by task kunit_try_catch/281
[   21.343894] 
[   21.344052] CPU: 2 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.344089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.344099] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.344112] Call trace:
[   21.344121]  show_stack+0x20/0x38 (C)
[   21.344145]  dump_stack_lvl+0x8c/0xd0
[   21.344169]  print_report+0x118/0x608
[   21.344191]  kasan_report+0xdc/0x128
[   21.344211]  __asan_report_load1_noabort+0x20/0x30
[   21.344236]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.344262]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   21.344289]  kunit_try_run_case+0x170/0x3f0
[   21.344315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.344344]  kthread+0x328/0x630
[   21.344369]  ret_from_fork+0x10/0x20
[   21.344393] 
[   21.350435] The buggy address belongs to the physical page:
[   21.350943] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103b0
[   21.351664] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.352358] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   21.352998] page_type: f8(unknown)
[   21.353323] raw: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.354027] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.354730] head: 03fffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.355440] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   21.356150] head: 03fffe0000000002 fffffdffc040ec01 00000000ffffffff 00000000ffffffff
[   21.356860] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   21.357565] page dumped because: kasan: bad access detected
[   21.358071] 
[   21.358216] Memory state around the buggy address:
[   21.358656]  ffff0000103b1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.359311]  ffff0000103b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.359965] >ffff0000103b2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.360615]                    ^
[   21.360917]  ffff0000103b2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.361571]  ffff0000103b2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.362223] ==================================================================
[   21.312441] ==================================================================
[   21.313482] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   21.314209] Read of size 1 at addr ffff00000c992a73 by task kunit_try_catch/279
[   21.314887] 
[   21.315052] CPU: 3 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.315104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.315118] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.315137] Call trace:
[   21.315149]  show_stack+0x20/0x38 (C)
[   21.315181]  dump_stack_lvl+0x8c/0xd0
[   21.315213]  print_report+0x118/0x608
[   21.315243]  kasan_report+0xdc/0x128
[   21.315272]  __asan_report_load1_noabort+0x20/0x30
[   21.315306]  mempool_oob_right_helper+0x2ac/0x2f0
[   21.315342]  mempool_kmalloc_oob_right+0xc4/0x120
[   21.315379]  kunit_try_run_case+0x170/0x3f0
[   21.315416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.315455]  kthread+0x328/0x630
[   21.315489]  ret_from_fork+0x10/0x20
[   21.315523] 
[   21.321566] Allocated by task 279:
[   21.321893]  kasan_save_stack+0x3c/0x68
[   21.322265]  kasan_save_track+0x20/0x40
[   21.322637]  kasan_save_alloc_info+0x40/0x58
[   21.323049]  __kasan_mempool_unpoison_object+0x11c/0x180
[   21.323554]  remove_element+0x130/0x1f8
[   21.323933]  mempool_alloc_preallocated+0x58/0xc0
[   21.324387]  mempool_oob_right_helper+0x98/0x2f0
[   21.324834]  mempool_kmalloc_oob_right+0xc4/0x120
[   21.325288]  kunit_try_run_case+0x170/0x3f0
[   21.325694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.326218]  kthread+0x328/0x630
[   21.326540]  ret_from_fork+0x10/0x20
[   21.326890] 
[   21.327043] The buggy address belongs to the object at ffff00000c992a00
[   21.327043]  which belongs to the cache kmalloc-128 of size 128
[   21.328175] The buggy address is located 0 bytes to the right of
[   21.328175]  allocated 115-byte region [ffff00000c992a00, ffff00000c992a73)
[   21.329350] 
[   21.329503] The buggy address belongs to the physical page:
[   21.330020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992
[   21.330746] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.331358] page_type: f5(slab)
[   21.331672] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   21.332388] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.333096] page dumped because: kasan: bad access detected
[   21.333611] 
[   21.333763] Memory state around the buggy address:
[   21.334211]  ffff00000c992900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.334877]  ffff00000c992980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.335544] >ffff00000c992a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.336206]                                                              ^
[   21.336839]  ffff00000c992a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.337505]  ffff00000c992b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.338166] ==================================================================